Analysis

  • max time kernel
    160s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    19-03-2022 23:46

General

  • Target

    56c5bee33c17a453c900725f88efb0466fd928072c420955fa599b518b9dfcd2.exe

  • Size

    573KB

  • MD5

    ee85e8c0956d2021732d9606120401f9

  • SHA1

    23199f07804d05a120e43b1930c910b1961d1ce6

  • SHA256

    56c5bee33c17a453c900725f88efb0466fd928072c420955fa599b518b9dfcd2

  • SHA512

    321d4d43ce87c6ac7612698190f664d7c96018884d2e1b5a30710c9106afbe4ea2d9720ad4eb80941a752c397945e67062d5f218019ef4f1b329bd2bea6275cc

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • BazarBackdoor

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Bazar/Team9 Backdoor payload 3 IoCs
  • Bazar/Team9 Loader payload 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56c5bee33c17a453c900725f88efb0466fd928072c420955fa599b518b9dfcd2.exe
    "C:\Users\Admin\AppData\Local\Temp\56c5bee33c17a453c900725f88efb0466fd928072c420955fa599b518b9dfcd2.exe"
    1⤵
      PID:3628

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3628-130-0x0000000001F20000-0x0000000001F79000-memory.dmp
      Filesize

      356KB

    • memory/3628-134-0x0000000001F80000-0x0000000001FD8000-memory.dmp
      Filesize

      352KB

    • memory/3628-139-0x00000000006F0000-0x0000000000746000-memory.dmp
      Filesize

      344KB